SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Generic)  >   Ruby Vendors:   Matsumoto, Yukihiro
Ruby Multiple Flaws Let Remote Users Inject Log Data, Deny Service, and Obtain Potentially Sensitive Information from the Heap
SecurityTracker Alert ID:  1039363
SecurityTracker URL:  http://securitytracker.com/id/1039363
CVE Reference:   CVE-2017-0898, CVE-2017-10784, CVE-2017-14033, CVE-2017-14064   (Links to External Site)
Date:  Sep 15 2017
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in Ruby. A remote user can modify data on the target system. A remote user can cause denial of service conditions on the target system. A remote user can obtain potentially sensitive information on the target system.

An application can provide a specially crafted format string value to trigger a buffer underrun in the Kernel.sprintf() method to cause the target interpreter to crash or to potentially access data from the heap [CVE-2017-0898].

A remote user can supply a specially crafted user name value to the WEBrick Basic authentication function to cause escape sequences to be injected into the log file. When the target administrator views the log contents via a terminal emulator, the escape sequences may be executed [CVE-2017-10784].

An application can provide a specially crafted string to the OpenSSL::ASN1 decode function to trigger a buffer underrun and cause the target interpreter to crash [CVE-2017-14033].

An application can pass a specially crafted instance of JSON::Ext::Generator::State class to the generate method of the JSON module to potentially obtain heap contents [CVE-2017-14064].

aerodudrizzt, Yusuke Endoh mame@ruby-lang.org, asac, and ahmadsherif reported these vulnerabilities.

Impact:   A remote user can inject data into log files on the target system.

A remote user can cause denial of service conditions.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix (2.2.8, 2.3.5).

The vendor advisories are available at:

https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/

Vendor URL:  www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/ (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 5 2017 (Ubuntu Issues Fix) Ruby Multiple Flaws Let Remote Users Inject Log Data, Deny Service, and Obtain Potentially Sensitive Information from the Heap
Ubuntu has issued a fix for Ubuntu Linux 14.04 LTS.
Dec 19 2017 (Red Hat Issues Fix) Ruby Multiple Flaws Let Remote Users Inject Log Data, Deny Service, and Obtain Potentially Sensitive Information from the Heap
Red Hat has issued a fix for Red Hat Enterprise Linux 6, 6.7, 7, 7.3, and 7.4.
Jan 10 2018 (Ubuntu Issues Fix) Ruby Multiple Flaws Let Remote Users Inject Log Data, Deny Service, and Obtain Potentially Sensitive Information from the Heap
Ubuntu has issued a fix for Ubuntu Linux 14.04 LTS, 16.04 LTS, and 17.10.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, SecurityGlobal.net LLC